Re: [v6ops] I-D Action: draft-ietf-v6ops-ipv6-ehs-packet-drops-01.txt

"Dale W. Carder" <dwcarder@es.net> Wed, 14 October 2020 21:09 UTC

Return-Path: <dwcarder@es.net>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B144B3A108B for <v6ops@ietfa.amsl.com>; Wed, 14 Oct 2020 14:09:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URI_DOTEDU=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=es.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GZ9fw1DyHmYy for <v6ops@ietfa.amsl.com>; Wed, 14 Oct 2020 14:09:19 -0700 (PDT)
Received: from mail-io1-xd44.google.com (mail-io1-xd44.google.com [IPv6:2607:f8b0:4864:20::d44]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3BCE53A108C for <v6ops@ietf.org>; Wed, 14 Oct 2020 14:09:18 -0700 (PDT)
Received: by mail-io1-xd44.google.com with SMTP id g7so1065288iov.13 for <v6ops@ietf.org>; Wed, 14 Oct 2020 14:09:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=es.net; s=esnet-google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=jcyJTVQlOgG7HnueX9MpAH6/GMLsDU4nXnZ1JOODsIU=; b=UJAvW+gbVQM7IdjlQL/mIFVEsB/EAKe8VwFKJ2005xcYmdjYYk6nNgpA6izGO9BGfn ARqbYpgO7aqodbsX7HlAd1ZzCwW4FLFza8fDQMiJLB4wJa/1a4JKfl8RVoEdKftIhSlB 2uky9V0QJbXjoruQ0lDUB5xHaYWF7Nps24qRcIPcsoZAfnkJR43bVLORQwjfhQARoQHg 5cXTatf/TsosT1unohbLJnv+F27IZRMD9v1vSNAwk0GT3TCCRSgGUattpQKAysILiNY8 gHx15iOs9gS/yQBCRrnPYf54/UDOEBi+H1g/CBesrOvxg1nAKjat6niOJ9UPFBrgw9wY ZqHA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=jcyJTVQlOgG7HnueX9MpAH6/GMLsDU4nXnZ1JOODsIU=; b=ax56i8U2C1SRcku5YjzhBPuEuGFnwgt6Ji/SuQMpuAeENSD10ZcyxclPlboHIipOdX 5Kuvpq9sILSr9c8I2MJy8bg1x4jMTSdhCaR4bkCCwBAcO1hohjxRgYwyznKUOg5Ef7LW sT3uk3M2VNSjA1/wBa3yz0vTHU8/ku4WyXG2awTxJFk5Ub9hwADiCuJiMELUQvTx+8Pt DwPuySrZDf6VN7FnL4OeIkzxB5mfvGgYcIt2uORvbT3KJck8xRZ/7yI14gINjMQlpxGj tXmE92Jiq8/JwvifKc7rtR1FY8WK/+3+Soe1vRzOjzM9BJzTb6uQVcOcVxajneiOXCPk EDwg==
X-Gm-Message-State: AOAM531/xuRF+pb6yIDIKngtqfuKC1WwBok82swH+EWX8ZlYC5Yh5KgD Zd0Gc7dxuxxvjWBpvtgWM9XJOEMbAGLcWxCytY8OxNpA5W9bISsBqXIaEWg8QY+LJhk2qeGo3eO RdPuzL+9DgTfKVsWI9ei1x9EzGBLqGr20ggPKyieEn5+IxS0Ytz9FNm977HciBHh1VMAK
X-Google-Smtp-Source: ABdhPJx+GZoIqsKo46etuloEo0Lbng8hOWj+Dkf7GQXSkFab+uRKW6H2orPVTrHNGqb2YlOuVduEgw==
X-Received: by 2002:a6b:c94f:: with SMTP id z76mr990565iof.88.1602709757732; Wed, 14 Oct 2020 14:09:17 -0700 (PDT)
Received: from localhost ([2600:6c44:7580:4a01:b0e1:67ab:1edb:3b49]) by smtp.gmail.com with ESMTPSA id f85sm583308ill.39.2020.10.14.14.09.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 14 Oct 2020 14:09:17 -0700 (PDT)
Date: Wed, 14 Oct 2020 16:09:15 -0500
From: "Dale W. Carder" <dwcarder@es.net>
To: Fernando Gont <fgont@si6networks.com>
Cc: Fernando Gont <fernando@gont.com.ar>, v6ops@ietf.org, draft-ietf-v6ops-ipv6-ehs-packet-drops.authors@ietf.org
Message-ID: <20201014210915.GC65211@dwc-desktop.local>
References: <160267848680.30465.9254381369345717221@ietfa.amsl.com> <6f1419fa-19ef-173a-5095-35fa51cc4ed2@gont.com.ar> <20201014161946.GA65211@dwc-desktop.local> <9ef70e2f-f2af-de92-2cac-face385c097c@si6networks.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <9ef70e2f-f2af-de92-2cac-face385c097c@si6networks.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/Vz3VYh8ChsQWiy4MLyQH-9ThpDI>
Subject: Re: [v6ops] I-D Action: draft-ietf-v6ops-ipv6-ehs-packet-drops-01.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Oct 2020 21:09:22 -0000

Thus spake Fernando Gont (fgont@si6networks.com) on Wed, Oct 14, 2020 at 01:39:21PM -0300:
> 
> Thanks a lot for your timely feedback! In-line....

well, you did threaten wglc  ;-)
 
> On 14/10/20 13:19, Dale W. Carder wrote:
> > Thus spake Fernando Gont (fernando@gont.com.ar) on Wed, Oct 14, 2020 at 09:37:38AM -0300:
> > > The rev is available at:
> > > https://tools.ietf.org/html/draft-ietf-v6ops-ipv6-ehs-packet-drops-01
> > 
> > In section 7.4, is it worth referencing covert channel risk from rfc6437's
> > section 6.1?
> 
> Section 7.4 is about the security implications of *EHs*... so that would be
> off-topic, so to speak...

Oh right, I get mixed up on that at times, sorry.  But related, covert side 
channel risk is probably on the minds of those justifying filtering EH's.  
This is the first easy reference I found, there are likely others:

Hansen, Raymond A.; Gino, Lourdes; and Savio, Dominic, "Covert6: A Tool
to Corroborate the Existence of IPv6 Covert Channels" (2016). 
Annual ADFSL Conference on Digital Forensics, Security and Law. 13.
https://commons.erau.edu/adfsl/2016/tuesday/13 

> > In section 7.1, I thought there was a class of devices (routers) where if
> > configured with a packet filter / acl that when unable to find the upper
> > protocol information buried past the size of the lookup engine would actually
> > forward traffic even if the policy was to deny.  I could have sworn I saw
> > this topic fly by on the v6ops list, but I can't find it (thus I don't want
> > to mistakenly name and shame).
> 
> I do recall reports of that. I guess we can simply note it without a
> reference?  (I don't mind the reference myself, but some of my co-authors
> might differ :-) )

Maybe it was about fragment processing rather than EH?  I hope this
triggers someone's memory.


> > I am not sure if I agree with the last paragraph of 6.1 which opines on
> > the low adoption of rfc6437-style flow label hash entropy.
> 
> We don't argue low-entropy, but issues with the Flow  Label implementation.
> See e.g.: https://blog.apnic.net/2018/01/11/ipv6-flow-label-misuse-hashing/
> 
> 
> 
> > I would
> > expect that the current low adoption in ecmp implementations is a
> > chicken/egg problem.  If you have a product that needs to hash and you are
> > not confident there is enough adoption in host stacks, you are still forced
> > to hunt for entropy from the upper-protocol protocols.  Otherwise all the
> > legacy host traffic with the flow label set to 0 risks getting hashed
> > entirely to one side or face reordering.
> 
> We're just stating that there's marginal usage of the Flow Label, which is
> what the work by Cunha et al seems to indicate. As to the possible
> consequences, part might be LBs lagging behind host implementations. But
> issues in the Flow Label implementation might have also discouraged its use.
> 
> That said, the important info that Section 6.1 is meant to convey is that
> there still seems to be marginal use of the FL. And also note that issues
> have been found in FL implementations. -- i.e., we're not trying to infer
> why there's marginal use of the FL.
> 
> If you think this warrants some tweaks in the text, please do let us know.

Ok, I think it's a misinterpretation of intent.  How about this slight
wordsmith for 6.1, which to me softens the causality claim that I inferred.

   While support of [RFC6437] is currently widespread for current
   versions of all popular host implementations, there is still only
   marginal usage of the IPv6 Flow Label for ECMP and load balancing
   [Cunha-2020].  A contributing factor could be the issues that have 
   been found in host implementations and middle-boxes [Jaeggli-2018].


Overall, I think this is a very useful doc!

Dale